Berkeley Lab

PII Certification (SEC 0221)

Skip to end of metadata
Go to start of metadata

PII Certification SEC 0221

About this course: How to use Spirion

Unlike read-only courses, you must install and run an application called Spirion. Spirion helps you locate and remove Protected Information from your computer. This course is a tutorial on how to use Spirion.

At the end of the tutorial and after you have removed Protected Information from your computers, you can receive credit.

What is Protected Information?

Protected Information includes Personally Identifiable Information (PII) and Personal Health Information (PHI). Berkeley Lab defines the following data, alone or in combination, as Protected Information:

  • Social security numbers
  • Financial account information
  • Drivers license numbers
  • California state ID number
  • Health information with personal identifiers, for example:
    • Name plus insurance number
    • Employee ID plus treatment information
    • Any unique ID plus any medical information

Why are we so careful about Protected Information?

To protect individual privacy, State and Federal lawmakers have created requirements for protecting and reporting the loss of PII and PHI. When a PII loss is reported, it often makes national media. For example, incidents at the Department of Veterans Affairs and UC Berkeley both made national news.

So a loss of Protected Information not only affects people’s privacy, but could hurt LBNL’s reputation and probably affect our open computing environment.

Our Protected Information Requirements strictly prohibit the storage of protected information on your desktop, laptop, or any other media (CD,DVD,USB Stick). Protected Information may only be stored in central business systems (FMS, HRIS, etc.). Review our Protected Information Requirements.

Berkeley Lab does not want to be the source of a PII or PHI disclosure. You certainly do not want to be the source of a PII disclosure. If you have protected information on your computer, right now is the time to remove it. You are in violation of our requirements and you are putting yourself, other lab employees, and the lab at risk.

Start by selecting the Windows or Mac tutorial.

Contact


If you have any questions about this training, please contact security@lbl.gov.